COMPUTER SAMPLE TEST MCQ's
Computer Multiple Choice Questions (MCQs)
1. All of the following are examples of real
security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
2. A process known as __________ is used by
large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
3. ____________terminals (formerly known as cash
registers) are often connected to complex inventory
and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4. A(n) __________ system is a small, wireless
handheld computer that scans an item’s tag and
pulls up the current price (and any special offers)
as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged
files from a criminal’s computer is an example of a
law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major
data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. __________ tags, when placed on an animal, can be used
to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating
devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
9. Technology no longer protected by copyright, available
to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
10. __________ is the study of molecules and structures
whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
Status : Offline
11. __________ is the science that attempts
to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
12. __________ is data that has been organized or presented
in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate data
into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow
users to __________ data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera
and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
16. Computers use the __________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
18. In the binary language each letter of the alphabet,
each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
21. Data rate of a ring network is 20Mbps and signal propagates at
200m/µsec. The number of bits that can be placed on the channel
of length 200km is
Answer :20000bits
22. The frequency range over which coaxial cables are typically used is
Answer :106 to 108 Hz
23. In internet, the well known port 21 refers to the application
Answer :FTP
24. The maximum data rate possible through a noise free 4 kHz binary
channel is
Answer :8000 bps
25. The transparency provided in a distributed system where users
cannot tell how many copies of a resource exist is termed as
Answer :Replication transparency
26. Which of the following configurations can be said to be tightly coupled
Answer :Shared memory multiprocessors
In distributed systems, RPC stands for
Answer :Remote Procedure Call
27. Assume there are 4 file servers each with a 0.95 chance of being
up at any instant. Probability of at least
one being available is
Answer :1-(.05)4
28. Which of the following category of classification of multiple
computer systems is not generally used in practice
Answer :MISD
29. In a distributed system, to ensure that concurrent transactions
do not interfere with each other, the transactions must have the
following specific property
Answer :Serializability
30. Translation Lookaside Buffer(TLB) is also called
Answer :Associative Memory
30. In Internet Standards Terminology, RFC refers to
Answer :Request For Comments
1. All of the following are examples of real
security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
2. A process known as __________ is used by
large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
3. ____________terminals (formerly known as cash
registers) are often connected to complex inventory
and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4. A(n) __________ system is a small, wireless
handheld computer that scans an item’s tag and
pulls up the current price (and any special offers)
as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged
files from a criminal’s computer is an example of a
law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major
data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. __________ tags, when placed on an animal, can be used
to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating
devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
9. Technology no longer protected by copyright, available
to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
10. __________ is the study of molecules and structures
whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
Status : Offline
11. __________ is the science that attempts
to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
12. __________ is data that has been organized or presented
in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate data
into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow
users to __________ data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera
and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
16. Computers use the __________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
18. In the binary language each letter of the alphabet,
each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
21. Data rate of a ring network is 20Mbps and signal propagates at
200m/µsec. The number of bits that can be placed on the channel
of length 200km is
Answer :20000bits
22. The frequency range over which coaxial cables are typically used is
Answer :106 to 108 Hz
23. In internet, the well known port 21 refers to the application
Answer :FTP
24. The maximum data rate possible through a noise free 4 kHz binary
channel is
Answer :8000 bps
25. The transparency provided in a distributed system where users
cannot tell how many copies of a resource exist is termed as
Answer :Replication transparency
26. Which of the following configurations can be said to be tightly coupled
Answer :Shared memory multiprocessors
In distributed systems, RPC stands for
Answer :Remote Procedure Call
27. Assume there are 4 file servers each with a 0.95 chance of being
up at any instant. Probability of at least
one being available is
Answer :1-(.05)4
28. Which of the following category of classification of multiple
computer systems is not generally used in practice
Answer :MISD
29. In a distributed system, to ensure that concurrent transactions
do not interfere with each other, the transactions must have the
following specific property
Answer :Serializability
30. Translation Lookaside Buffer(TLB) is also called
Answer :Associative Memory
30. In Internet Standards Terminology, RFC refers to
Answer :Request For Comments
Comments
Post a Comment